
Information Security Policies and Procedures
A Practitioner's Reference, Second Edition
- Publisher's listprice GBP 125.00
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 12 652 Ft off)
- Discounted price 50 610 Ft (48 200 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
63 262 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 2, New edition
- Publisher Auerbach Publications
- Date of Publication 11 June 2004
- ISBN 9780849319587
- Binding Hardback
- No. of pages408 pages
- Size 234x156 mm
- Weight 910 g
- Language English
- Illustrations 22 Illustrations, black & white; 53 Tables, black & white 0
Categories
Short description:
This book illustrates how policies and procedures support the efficient running of an organization. It points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements. The authors emphasize how information security must be integrated into all business processes. The book examines Tier 1, Tier 2, and Tier 3 policies.
MoreLong description:
Information Security Policies and Procedures: A Practitioner?s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies.
The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures.
It may be tempting to download some organization?s policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.
?The path to information security is a long one, but in this book author Thomas Peltier makes the scenery attractive along the way. Peltier walks the reader through [the text] with clarity, completeness, and humor. ?
? Security Management, June 2005
Table of Contents:
INFORMATION SECURITY POLICIES AND PROCEDURES. Introduction. Why manage this process as a project? Planning and preparation. Developing policies. Asset classification policy. Developing standards. Developing procedures. Creating a table of contents. Understanding how to sell policies, standards, and procedures. Appendix 1A Typical tier 1 policies. Appendix 1B Typical tier 2 policies. Appendix 1C Sample standards manual. Appendix 1D Sample information security manual. INFORMATION SECURITY REFERENCE GUIDE. Introduction to information security. Fundamentals of information security. Employee responsibilities. Information classification. Information handling. Tools of information security. Information processing. Information security program administration. Baseline organization information security program. Appendix 2A.
More